InternalDataSourcesProcessingDatabaseSoftwareOutputComputerVirusSmartcardsComputerLiteracyScannersPresentationSoftwareDisplacedworkersHardwareEcommerceRecordManagementSystemOperatingSystemSoftwareIntranetSpreadsheetsoftwareTelecommutingProgramComputerNetworkVideoconferencingManagementPiracyInputDatabaseMarketingIdentitytheftComputerSystemWhiteCollarCrimeComputeraideddesignMemoryInternalDataSourcesProcessingDatabaseSoftwareOutputComputerVirusSmartcardsComputerLiteracyScannersPresentationSoftwareDisplacedworkersHardwareEcommerceRecordManagementSystemOperatingSystemSoftwareIntranetSpreadsheetsoftwareTelecommutingProgramComputerNetworkVideoconferencingManagementPiracyInputDatabaseMarketingIdentitytheftComputerSystemWhiteCollarCrimeComputeraideddesignMemory

Unit 6 Chapter 5 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
G
3
O
4
N
5
N
6
B
7
B
8
I
9
I
10
N
11
N
12
I
13
O
14
B
15
G
16
B
17
O
18
O
19
N
20
I
21
I
22
B
23
O
24
G
25
B
26
I
27
G
28
O
29
G
  1. G-Internal Data Sources
  2. G-Processing
  3. O-Database Software
  4. N-Output
  5. N-Computer Virus
  6. B-Smartcards
  7. B-Computer Literacy
  8. I-Scanners
  9. I-Presentation Software
  10. N-Displaced workers
  11. N-Hardware
  12. I-Ecommerce
  13. O-Record Management System
  14. B-Operating System Software
  15. G-Intranet
  16. B-Spreadsheet software
  17. O-Telecommuting
  18. O-Program
  19. N-Computer Network
  20. I-Videoconferencing
  21. I-Management
  22. B-Piracy
  23. O-Input
  24. G-Database Marketing
  25. B-Identity theft
  26. I-Computer System
  27. G-White Collar Crime
  28. O-Computer aided design
  29. G-Memory